SI-03-727 Malicious Code Protection

Malicious Code Protection

SI-03-727
Malicious Code Protection
System and Information Integrity
Detect
Malware Protection
LOW, MOD, HIGH
P1
Yes
May 20, 2016

All Agency information resources use a centrally administered anti-malware application/service/utility to detect and eradiate or quarantine malicious code.

Unauthorized, malicious code is executed on systems without authorization.
The organization: a. Employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code; b. Updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures; c. Configures malicious code protection mechanisms to: 1. Perform periodic scans of the information system [Assignment: organization-defined frequency] and real-time scans of files from external sources at [Selection (one or more); endpoint; network entry/exit points] as the files are downloaded, opened, or executed in accordance with organizational security policy; and 2. [Selection (one or more): block malicious code; quarantine malicious code; send alert to administrator; [Assignment: organization-defined action]] in response to malicious code detection; and d. Addresses the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the information system.
Malicious code mechanism conduct periodic system scans for vulnerabilities.
The information system implements malicious code protection.
Obtain system and information integrity policy; procedures addressing malicious code protection; NIST Special Publication 800-83; malicious code protection mechanisms; records of malicious code protection updates; information system configuration settings and associated documentation; information system design documentation; other relevant documents or records and ascertain if: (I) if the information system prevents non-privileged users from circumventing malicious code protection capabilities.